General

  • Target

    5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe

  • Size

    1.8MB

  • Sample

    241117-kyj5hawepf

  • MD5

    ad09440875d20aadffdfdc8de043c448

  • SHA1

    fbfc7d94285b1da7e0799382a40352f827984771

  • SHA256

    5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508

  • SHA512

    e8d80aa2ec81b8b06b2a83e18674e19137b996f405dc4e6c93a3fcf76de0e949cbc333396a22141963043fd55ff9a8711eabd0963b933df58e4438f42706e8a3

  • SSDEEP

    24576:zyvTg4STbYSG65XZsTBsR36Y1864kHFLlb/sgaspAqsbTsIvVJUl52iFxA4Gbgz:W6hdR3KlyFLlbsrs6PbTJU24GbQ

Malware Config

Targets

    • Target

      5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508.exe

    • Size

      1.8MB

    • MD5

      ad09440875d20aadffdfdc8de043c448

    • SHA1

      fbfc7d94285b1da7e0799382a40352f827984771

    • SHA256

      5af44c8748dfd602affc88b52200f5c0f9c54065876a8de8dddb1e4548793508

    • SHA512

      e8d80aa2ec81b8b06b2a83e18674e19137b996f405dc4e6c93a3fcf76de0e949cbc333396a22141963043fd55ff9a8711eabd0963b933df58e4438f42706e8a3

    • SSDEEP

      24576:zyvTg4STbYSG65XZsTBsR36Y1864kHFLlb/sgaspAqsbTsIvVJUl52iFxA4Gbgz:W6hdR3KlyFLlbsrs6PbTJU24GbQ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks